Physical security methods for workstations

Physical security methods for workstations
Physical security methods for workstations

Physical security methods for workstations, servers, and network devices

Chapter7
1. Explain physical security methods for workstations, servers, and network devices
2. Implement a network topology for security
3. Explain network communications media in relation to security
4. Discuss how to train workstation users about physical security as shown on page 315 of the text.
5. Discuss the various configurations of wiring closets listed on page 321 of the text.
6. Discuss with students the structured wiring requirements listed on page 333 of the text.
7. Discuss the vertical wiring principles when planning your network as illustrated on page 335 of the text.
8. Discuss what it takes to implement a stable network topology.
9. Discuss the many reasons organizations use centralized or decentralized management.
Case Project 7-2: Expanding Workstation Security
Balsam Music is impressed by the document you created in Case Project 7-1 and they want to continue to explore ways to make user workstations more secure. The Security Steering Committee asks you to create a report that describes ways to secure workstations that go beyond configuring screen savers.
Answers to the Chapter 7 Review Questions

1. You are operating a network management station and discover that you cannot find out information about network performance at a NetWare 6.0 server. Which of the following is the best solution?
Answer:

2. The fire marshal in your city has just inspected the wiring that goes through the ceiling on the second floor of your building and says it is dangerous because the network wiring can cause toxic vapors in a fire. What is the wiring most likely to contain?
Answer:

3. You are designing the network in a building and want to use a cable that will provide speed and security for communications between floors in the building. Which of the following would be the best choice?
Answer

4. Which if the following is important when you centralize servers in a computer room? (Choose all that apply.)
Answer:

5. Which type of cable is most difficult for an intruder to tap into without causing attention to his action?
Answer:

6. In terms of security, a disadvantage of the star topology is that __________________________.
Answer:

7. You are consulting about an older thin coax network when the network goes down because of the work of an attacker. Which of the following is a likely cause of the problem?
Answer:

8. The twists in twisted-pair cable are there to __________________________________. (Choose all that apply.)
Answer:

9. On your NetWare server, someone occasionally loads NLMs that you have not authorized. The financial auditors are very concerned about this problem. Which of the following offer(s) a solution?
Answer:

10. Which of the following fit(s) the definition of a cipher lock that might be used to protect a machine room? (Choose all that apply.)
Answer:

11. In the design of a network you should plan to use which of the following? (Choose all that apply.)
Answer:

12. A department head calls you because she is working on personnel evaluations and she does not want to log off Red Hat Linux 9.x for security each time she leaves her desk for a few moments. What do you recommend?
Answer:

13. Wiring closets should follow the ___________________________ standard.
Answer:

14. When you replace a legacy cable plant, which of the following should you consider? (Choose all that apply.)
Answer:

15. Which cable is most flexible and has the tightest bending radius (providing some protection from a malicious attack)?
Answer:

16. Which parameter used with SCRSAVER in NetWare enables you to display the screen saver’s current settings?
Answer:

17. An intermediate cross-connect is ______________________________.
Answer:

18. SNMP is used with which of the following? (Choose all that apply.)
Answer: a. and d.

19. Your department is almost out of money that is budgeted for this year, and so you are installing twisted-pair cable yourself to connect several new computers to the network. Which of the following is important for you to consider? (Choose all that apply.)
Answer:

20. When you install SNMP, configure a _______________________ at the same time.
Answer:

Any assignment received after the time of the class is considered late (NO EXCUSES) and is graded with 0% off for each class it is late.

We can write this or a similar paper for you! Simply fill the order form!

IT management Essay Assignment Paper

 IT management
IT management

IT management

Given there are both, public, private, and hybrid clouds in use in today’s enterprise, discuss why an organization would choose a specific medium for their cloud prospects. Evaluate, IaaS, PaaS, SaaS, IDaaS and discuss the pros and cons of each in today’s cloud environments.
How do these differ from public and private cloud settings?

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

We can write this or a similar paper for you! Simply fill the order form!

Information Systems Strategy McDonalds

Information Systems Strategy McDonalds

Paper about McDonald’s geared towards information technology. Examples include CRM, internet of things, eCommerce, enterprise information system, etc..

Information Systems Strategy McDonalds
Information Systems Strategy McDonalds

Need the following:

Company Overview

SWOT Analysis

Use of information systems to support the overall strategy.

Use of information systems for a competitive advantage.

Michael Porter’s Five Forces Model 

How can this company use emerging technology to maintain and sustain a competitive advantage?

Information Systems Strategy McDonalds Case Study

The McDonald’s Corporation was born from brothers Richard and Maurice McDonald from a single drive-in restaurant in San Bernardino, California in 1948 to the largest food service organization in the world.  By 1991 McDonald’s owned $13 billion of the fast-food industry, operating 12,400 restaurants in 59 countries. Today it has grown to over 35,000 restaurants in over 100 countries. It serves more than 70 million customers per day and employs more than four million people.

McDonald’s offers a uniform menu that includes fries, the Big Mac, chicken sandwiches, chicken nuggets, hamburgers, the quarter pounder with cheese, salads, wraps, desserts, soft drinks, and other beverages. Because of changing consumer tastes over the years, they continue to expand its menu to include all kinds of extras including salads, fish, wraps, smoothies and even fresh fruit.

To ensure that they connect with the international markets, McDonald’s offers locally relevant food menus as well. In Germany, you can pick up a McSausage Burger. In Greece, a Greek Mac. In New Zealand, a KiwiBurger. In Costa Rica, a McPinto Deluxe, with rice, beans, and plantains (Kelly, 2012)

Information Systems Strategy McDonalds

McDonald’s is a global company facing national and international competition from other restaurant operators. The management has identified its competitors to be quick-service eating establishments, casual dining, full-service restaurants, street stalls or kiosks, cafes, specialist coffee shops, self-service cafeterias, and juice or smoothie bars.

Information Systems Strategy McDonalds Strengths

  • McDonalds’ low-cost menu “Dollar Menu & More,” has been instrumental in driving customer
  • McDonald’s purchases raw materials required for the menu in bulk, which helps achieve economies of scale and eventually benefits the customers through such low-cost food options.
  • Market power over suppliers and competitors

Information Systems Strategy McDonalds Weaknesses

  • McDonalds’ food has continuously been in the limelight for its quality and how it affects health. Documentaries such as “Super Size Me” garnered further negative publicity for McDonald’s.
  • The maintenance of equipment at the older restaurants have affected the operations thus slowing down the service
  • Marketing target audience focusing on kids through their advertisements that will grow into health-conscious adults

Information Systems Strategy McDonalds Opportunities

  • Joint ventures with retailers (e.g. supermarkets).
  • Respond to social changes by innovation within healthier lifestyle foods.
  • Use of CRM, database marketing to more accurately market to its consumer target groups. It could identify likely customers (based on modeling and profiles of shoppers) and prevent brand switching.
  • Strengthen its position in the high-margined caffeinated beverages industry, dominated by Starbucks
  • International expansion into emerging markets of China and India.
Information Systems Strategy McDonalds Threats
  • The Mature/overstored industry
  • Strength of competition
  • More health-conscious consumers
  • Changing demographics
  • Fluctuation of foreign exchange rates; Economies

Recession or downturn in the economy may affect the retailer sales eats

1) Use of information systems to support the overall strategy.

2)  Use of information systems for a competitive advantage.

  1. a) If applicable, write about:
  2. i) Overall cost leadership
  3. ii) Differentiation

iii) Focus

3) Michael Porter’s Five Forces Model

  1. a) Buyer power
  2. b) Supplier power
  3. c) The threat of substitute products or services
  4. d) The threat of new entrants
  5. e) Rivalry among existing competitors

4) How can this company use emerging technology to maintain and sustain a competitive advantage?

Information Systems Strategy McDonalds References

Kelly, N. (2012, October 12). McDonald’s’ Local Strategy, from El McPollo to Le McWrap Chèvre. Retrieved February 25, 2019, from https://hbr.org/2012/10/mcdonalds-local-strategy-from.

We can write this or a similar paper for you! Simply fill the order form!

Programming C++ Assignment Paper

Programming C++
                       Programming C++

Programming C++

For your fourth programming assignment you will be writing the following C++ program: In a population, the birth rate is the percentage increase of the population due to births, and the death rate is the percentage decrease of the population due to deaths. Write a program that displays the size of a population for any number of years.

The program should ask for the following data:

  • The starting size of a population
  • The annual birth rate
  • The annual death rate
  • The number of individuals who move into the area each year
  • The number of individuals who leave the area each year
  • The number of years to display

We can write this or a similar paper for you! Simply fill the order form!

Information Security Data and Knowledge Management

Information Security Data and Knowledge Management 1.) Information Security

Information security is one of the top issues in today’s business environment.

Information Security Data and Knowledge Management
Information Security Data and Knowledge Management

Businesses who thought they did not need to spend company resources for information security are now finding out the hard way that they were wrong. Information security is the protection of information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction. A threat to an information resource is any danger to which a system may be exposed. The exposure of an information resource is the harm, loss, or damage that can result if a threat compromises that resource. An information resource’s vulnerability is the possibility that the system will be harmed by a threat.

– Does the security burden fall primarily on the user? On the company that the user is doing business with? On both? Explain and support your answer. Apply APA formatting standards by using peer-reviewed articles and journals, providing evidenced-based examples, in your own words, to support your answer written in essay/paragraph format.

– Is it possible to ever have complete security in your online transactions? Why or why not? Explain your answer. Explain and support your answer. Apply APA formatting standards by using peer-reviewed articles and journals, providing evidenced-based examples, in your own words, to support your answer written in essay/paragraph format.

If you get information from any source other than the textbook, document the source.

Apply APA formatting standards by using peer-reviewed articles and journals, providing evidenced-based examples, in your own words, to support your answer written in essay/paragraph for

Use the APA style for documenting sources in the body of your report and in the reference list. See https://owl.english.purdue.edu/owl/resource/560/01/ for information about the APA style, including examples of how to use it for in-text citations and the reference list.

Must be at least 500 words.

Check for and correct all spelling and grammar problems.

Structure your response as an essay.

Include a thesis sentence at the start of each paragraph and make sure the paragraph focuses on that thesis.

Use complete sentences and keep your sentences simple.

If your response consists of multiple paragraphs, make sure the paragraphs flow smoothly.

The name of the book is “Handbook of Training Evaluation and Measurement Methods” by Jack J. Phillips and Pulliam Phillips 4th Edition. Chapter 4

2.) Data and Knowledge Management

How do you distinguish between meaningful and useless data? Recall the last time you bought something in a store. What information did you provide the cashier, either directly or indirectly? Did the cashier ask for your ZIP code or phone number? How did you pay? Cash? Credit or debit card? Do you have a customer loyalty card for the store? Did you use it? Did you have to show any form of ID (i.e. driver’s license)? All of this and more is captured, along with information about the items you bought, in the stores data management systems.

Big Data refers to the vast and constantly increasing amounts of data that modern organizations need to capture, store, process, and analyze.

Big data is considered a buzzword (Links to an external site.)Links to an external site., or catch-phrase, that is used to describe a massive volume of both structured (Links to an external site.)Links to an external site. and unstructured data (Links to an external site.)Links to an external site. that is so large that it’s difficult to process using traditional database (Links to an external site.)Links to an external site. and software (Links to an external site.)Links to an external site. techniques.

While the term may seem to reference the volume of data, that isn’t always the case. The term big data may refer to the technology (which includes tools and processes) that an organization requires to handle the large amounts of data and storage facilities.

– It is possible to find many Web sites that provide demographic information. Access several of these sites and see what they offer. Do the sites differ in the types of demographic information they offer? How? Do the sites require a fee for the information they offer? Would demographic information be useful to you if you wanted to start a new business? If so, how and why? Compare these web sites and choose one that you would use if you were to start a business. Explain and support your answer. Apply APA formatting standards by using peer-reviewed articles and journals, providing evidenced-based examples, in your own words, to support your answer written in essay/paragraph format.

– Calculate your personal digital footprint at http://www.emc.com/digital_universe/downloads/web/personal-ticker.htm (Links to an external site.)Links to an external site.. Were you aware of all the data that you generate? Explain and support your answer. Are you sure that you entered everything? Support your answers. Apply APA formatting standards by using peer-reviewed articles and journals, providing evidenced-based examples, in your own words, to support your answer written in essay/paragraph format.

If you get information from any source other than the textbook, document the source.

Use the APA style for documenting sources in the body of your report and in the reference list. See https://owl.english.purdue.edu/owl/resource/560/01/ (Links to an external site.) Links to an external site. for information about the APA style, including examples of how to use it for in-text citations and the reference list.

Must be at least 500 words.

Check for and correct all spelling and grammar problems.

Structure your response as an essay.

Include a thesis sentence at the start of each paragraph and make sure the paragraph focuses on that thesis.

Use complete sentences and keep your sentences simple.

If your response consists of multiple paragraphs, make sure the paragraphs flow smoothly.

The name of the book is “Handbook of Training Evaluation and Measurement Methods” by Jack J. Phillips and Pulliam Phillips 4th Edition. Chapter 5

We can write this or a similar paper for you! Simply fill the order form!

IT Strategy Research Assignment Paper

IT Strategy
IT Strategy

IT Strategy

Read Mini Case (Building Shared Services at RR Communications) on Page 156 of James D. McKeen, Heather A. Smith, IT Strategy: Issues and Practices, Third Edition. Pearson, 2015, ISBN-13 978-0-13-354424-4. Write one page paper on “What business and IT problems can be caused by lack of common information and an enterprise IM strategy?”

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

We can write this or a similar paper for you! Simply fill the order form!

Why Collaboration Information Systems Are Important

Why Collaboration Information Systems Are Important
Why Collaboration Information Systems Are Important

Why Collaboration Information Systems Are Important

In this assignment, you will create a presentation for your organization to explain how successful collaboration can improve success and provide competitive advantages.

Scenario: Your organization has used a variety of collaboration systems developed by some project managers. Some of these systems were successful while others were not. Your organization has one unique challenge many of your employees are staffed at other locations or work from home (telework). You would like to standardize the collaboration process to improve team communication for all company projects. In your presentation, you should include the elements listed below.

Explain why collaboration information systems (IS) are important from the organization’s perspective.

Discuss how collaboration tools can improve team communication.

Identify three tools that will be used for synchronous communications and three tools that will be used for asynchronous communications. Be sure to explain why you made these choices.

Describe how project files, such as Microsoft (MS) Word, MS Excel, MS Project, and MS Visio, will be shared with team members. Be sure to explain the rationale behind your choice.

Explain how the task list for managing tasks will be shared with team members. Be sure to explain the rationale behind your choice.

Discuss how this new collaboration IS could provide competitive advantages for your organization.

Your presentation should be a minimum of six slides in length (not counting the title and reference slides). Use of images, graphics, and diagrams is encouraged.

You can use an industry of your choosing or examples from your personal or professional experiences in developing this assignment. You can also use the resources in the Unit II Suggested Reading section to assist you with this assignment.

Be sure to follow the 7×7 rule (i.e., there should be no more than 7 words per line and no more than 7 lines per slide). You are required to use speaker notes to discuss the bullet points on your slides.

You must use at least two academic resources to support your presentation, and you must cite (in APA format)

any information on your slides or in your speaker notes that came from these sources.

We can write this or a similar paper for you! Simply fill the order form!

Remote access capabilities Assignment

Remote access capabilities
               Remote access capabilities

Remote access capabilities

Why are remote access capabilities a necessity in today’s computing environment and how can an organization leverage these capabilities for greater productivity without creating a security risk?

Question B

Why is it important to apply security methods to both physical and wireless communications and which medium is easier to secure against an attack?

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

We can write this or a similar paper for you! Simply fill the order form!

Managing device virtualization and cloud deployment

Managing device virtualization and cloud deployment
   Managing device virtualization and cloud                                             deployment

For many IT professionals, managing device virtualization and cloud deployment is a daunting task.

To facilitate the process, various companies offer an off-the-shelf-product that offers life cycle solutions for managing private cloud deployments and optimizing the underlying virtual devices. Given the current research paradigm, discuss how cloud-management considerations may vary across the life cycle of a cloud-based solution. In this sample, you will play the role of the subject matter expert (SME) making a decision for your organizational needs. Outline the overall modular process from planning, integration, maintenance, and finally termination.

We can write this or a similar paper for you! Simply fill the order form!

Information Technology Governance Frameworks

Information Technology Governance Frameworks
Information Technology Governance                Frameworks

Integrating NIST’s Cybersecurity Framework with Information Technology Governance Frameworks

Your first task is to prepare a 3 to 4 page research paper which provides an analysis of the IT Governance, IT Management, and Risk Management issues and problems that might be encountered by an e-Commerce company (e.g. Amazon, e-Bay, PayPal, etc.). Your paper should also include information about governance and management frameworks that can be used to address these issues. The specific frameworks that your team leader has asked you to address are:

ISO/IEC 27000 Family of Standards for Information Security Management Systems

ISACA’s Control Objectives for Information Technology (COBIT) version 5

NIST’s Cybersecurity Framework (also referred to as the Framework for Improving Critical Infrastructure Security)

We can write this or a similar paper for you! Simply fill the order form!